Agency|Insights

Firewall Requirements for SOC 2 Compliance

SOC 2 firewall requirements covering relevant Trust Service Criteria, cloud-native firewalls, WAF implementation, evidence collection, and working with auditors on network security evidence.

Agency Team
Agency Team
·12 min read
Typographic card for Firewall Requirements for SOC 2 Compliance in Audit Insights & Preparation

One of the questions that comes up in almost every SOC 2 readiness engagement we run is: "What exactly do auditors want to see for firewalls?" The answer we give surprises many teams — SOC 2 does not prescribe specific firewall products, architectures, or rule configurations. It is principle-based, which means it requires you to demonstrate that you have implemented security measures to protect against threats from outside your system boundaries. In our experience, this principle-based approach is both a strength and a source of confusion. It gives you flexibility to use cloud-native security controls rather than traditional firewall appliances, but it also means you need to clearly articulate and evidence how your network security architecture satisfies the Trust Service Criteria. The organizations that struggle are the ones that cannot explain their firewall decisions to an auditor, not the ones using the wrong firewall technology.

This guide covers SOC 2 firewall requirements, including the relevant Trust Service Criteria, cloud-native firewall implementations across AWS, Azure, and GCP, WAF deployment, evidence collection strategies, and how to work with your auditor on network security evidence.

Relevant Trust Service Criteria

CC6.1 — Logical Access Security

CC6.1 requires that the entity implements logical access security software, infrastructure, and architectures over protected information assets. Firewalls are a core component of logical access infrastructure because they control which network traffic can reach your systems.

CC6.1 RequirementFirewall Implementation
Logical access is restrictedFirewall rules restrict network access to authorized sources, ports, and protocols
Infrastructure protects information assetsFirewalls create network boundaries that prevent unauthorized access to databases, application servers, and internal services
Access architectures are implementedFirewall architecture defines network zones (public, application, data) with controlled access between them

CC6.6 — Security Measures Against Threats Outside System Boundaries

CC6.6 is the most directly relevant criterion for firewalls. It requires that the entity implements controls to prevent or detect and act on threats from sources outside the boundaries of the system. This is where your firewall architecture, rule set, and monitoring capabilities are evaluated.

What we tell clients is that CC6.6 is where the auditor spends the most time on network security. The criterion asks you to demonstrate:

  • How you define your system boundaries (what is inside vs outside)
  • What controls protect those boundaries from external threats
  • How those controls are monitored and maintained
  • How you detect and respond to threats that attempt to cross those boundaries

In our experience, the system boundary definition is the critical starting point. If you cannot clearly define where your system boundaries are — which network segments are within scope, which connections cross the boundary, and what controls exist at each crossing point — the auditor cannot evaluate whether your firewall controls are adequate.

CC6.7 — Restricting Data Transmission and Movement

CC6.7 requires restricting the transmission, movement, and removal of information to authorized internal and external users and processes. Firewalls support CC6.7 by controlling which data flows are permitted across network boundaries.

CC6.7 RequirementFirewall Role
Data transmission is restrictedEgress firewall rules control what data can leave your network
Movement of information is controlledNetwork segmentation firewalls control data flow between internal zones
Unauthorized transmission is preventedDLP-capable firewalls and WAFs inspect traffic for unauthorized data movement

Additional Relevant Criteria

CriteriaFirewall Relevance
CC6.2 — Registration and authorizationNetwork access requires that sources are identified and authorized through firewall rules
CC7.1 — Monitoring infrastructureFirewall logs and alerts are part of your security monitoring infrastructure
CC7.2 — Monitor system componentsFirewall events are monitored for anomalies indicating potential security incidents
CC7.3 — Evaluate security eventsFirewall alerts feed into your security event evaluation process
CC8.1 — Change managementFirewall rule changes are subject to your change management process

Cloud-Native Firewalls

AWS Security Groups and NACLs

In our experience, the majority of SOC 2 clients use AWS as their primary cloud platform. AWS provides two levels of native network firewall controls.

Security Groups (Stateful)

Security Groups are the primary firewall control in AWS. They operate at the instance (ENI) level and are stateful, meaning return traffic is automatically permitted.

Security Group Best PracticeSOC 2 Justification
Default deny inboundCC6.1 — Restrict access to authorized traffic only
Specific source restrictions (no 0.0.0.0/0 except for public-facing services)CC6.6 — Prevent unauthorized access from outside system boundaries
Port-specific rules (not all-traffic rules)CC6.1 — Least-privilege network access
Security group references instead of IP ranges where possibleCC6.1 — Access tied to identity (service role) rather than network location
Descriptive rule names and documentationCC8.1 — Change management traceability

Network ACLs (Stateless)

Network ACLs provide an additional layer of firewall control at the subnet level. They are stateless, meaning both inbound and outbound rules must be explicitly defined.

What we recommend is using Security Groups as your primary firewall control and NACLs as a secondary defense-in-depth layer. In our experience, auditors are satisfied with Security Groups alone for most architectures, but NACLs demonstrate defense-in-depth for organizations that want a stronger control posture.

AWS Network Firewall

AWS Network Firewall provides stateful and stateless traffic inspection at the VPC level, with IDS/IPS capabilities and domain-based filtering. What we tell clients is that AWS Network Firewall is appropriate for organizations that need centralized traffic inspection across multiple VPCs or advanced threat detection, but it is not required for SOC 2 compliance if your Security Groups and NACLs are properly configured.

Azure Network Security Groups

Azure NSGs function similarly to AWS Security Groups, providing stateful firewall rules that can be applied to subnets or individual network interfaces.

Azure NSG Best PracticeSOC 2 Justification
Default deny inbound with explicit allow rulesCC6.1 — Restrict access to authorized sources
Application Security Groups (ASGs) for role-based rulesCC6.1 — Logical grouping of resources with similar access requirements
NSG flow logs enabledCC7.1 — Monitor network traffic for security events
Network Watcher integrationCC7.2 — Continuous monitoring of network components
Azure Firewall for centralized traffic managementCC6.6 — Centralized threat protection at network boundaries

GCP Firewall Rules

GCP firewall rules are applied at the VPC network level and can target instances using network tags or service accounts.

GCP Firewall Best PracticeSOC 2 Justification
Default deny ingress (GCP default)CC6.1 — Restrict inbound access to explicitly authorized traffic
Service account-based targetingCC6.1 — Access rules tied to workload identity rather than IP
Priority-based rule ordering with explicit deny rulesCC6.6 — Systematic approach to traffic filtering
VPC Flow Logs enabledCC7.1 — Network traffic monitoring and analysis
Hierarchical firewall policies for organization-wide rulesCC6.6 — Consistent security baselines across projects

Cloud-Native Firewalls Are Sufficient

What we tell clients — and this is one of the most important points in this guide — is that cloud-native firewall controls are sufficient for SOC 2 compliance. You do not need to deploy third-party firewall appliances in a cloud environment to satisfy your auditor. The Trust Service Criteria are principle-based, and cloud-native security groups, NSGs, and firewall rules demonstrate appropriate network access controls when they are:

  1. Configured following least-privilege principles
  2. Documented and traceable to business requirements
  3. Subject to change management processes
  4. Monitored through logging and alerting
  5. Reviewed periodically for continued appropriateness

In our experience, auditors understand cloud-native security controls and evaluate them the same way they would evaluate traditional firewall appliances — by reviewing the rules, the change control, and the monitoring.

WAF Implementation

Why WAF Matters for SOC 2

Web Application Firewalls protect your public-facing applications from application-layer attacks. While SOC 2 does not explicitly require WAF, CC6.6 requires security measures against external threats, and application-layer attacks (SQL injection, XSS, CSRF) are among the most common external threats to web applications.

What we recommend is deploying WAF for all public-facing web applications and APIs. In our experience, auditors increasingly expect WAF as a baseline control for organizations with web-based services.

WAF Options by Cloud Platform

PlatformWAF ServiceKey FeaturesIntegration
AWSAWS WAFManaged rule groups (OWASP, bot control, IP reputation), custom rules, rate limitingCloudFront, ALB, API Gateway, App Runner
AzureAzure WAFOWASP rule sets, custom rules, bot protectionApplication Gateway, Front Door, CDN
GCPCloud ArmorOWASP rule sets, adaptive protection, rate limiting, bot managementCloud Load Balancing
Multi-cloudCloudflare WAFManaged rules, custom rules, rate limiting, bot management, DDoS protectionDNS-based; works with any origin

WAF Configuration for SOC 2

What we recommend configuring in your WAF:

ConfigurationPurposeSOC 2 Criteria
OWASP managed rule setProtect against common web application vulnerabilitiesCC6.6 — Security measures against external threats
Rate limitingPrevent brute force and denial-of-service attacksCC6.6 — Threat prevention at system boundaries
IP reputation blockingBlock traffic from known malicious sourcesCC6.6 — Threat detection and prevention
Bot managementDistinguish legitimate bot traffic from malicious botsCC6.6 — Threat detection
Custom rules for application-specific protectionsAddress threats specific to your application logicCC6.6 — Application-specific threat prevention
Logging enabledCapture WAF events for monitoring and incident investigationCC7.1 — Security monitoring

WAF Evidence for Auditors

EvidenceWhat It ShowsHow to Collect
WAF configurationWhich rule sets are enabled and how they are configuredWAF console export or IaC definition
WAF event logsBlocked and allowed requests with rule match detailsWAF logging to CloudWatch, Azure Monitor, or similar
WAF metricsVolume of blocked requests, rule match rates, false positive ratesWAF dashboard or monitoring platform
WAF rule update historyWhen managed rules were updated and any custom rule changesWAF configuration change history or IaC commits

Evidence Collection

System Description

Your SOC 2 report's system description should clearly document your network security architecture. What we recommend including:

Description ElementContent
Network architecture overviewHigh-level description of your network topology, including VPCs, subnets, availability zones, and network zones
System boundary definitionClear definition of what is inside your system boundary and what is outside
Firewall architectureDescription of firewall controls at each boundary crossing (security groups, NACLs, WAF, cloud firewall)
Network segmentationHow networks are segmented (production vs development, application tier vs data tier, public vs private)
Monitoring approachHow network traffic is monitored and how security events are detected

Evidence Package

In our experience, auditors request the following evidence for firewall controls during a SOC 2 audit:

EvidenceSourceAuditor Purpose
Network architecture diagramInfrastructure documentationUnderstand system boundaries and firewall placement
Firewall rule exportCloud console or IaC repositoryEvaluate whether rules follow least-privilege principles
Firewall rule documentationInternal documentation or IaC commentsVerify that rules are justified and documented
Change management recordsTicketing system or IaC commit historyVerify that firewall changes follow change management process
Firewall logs (sample)SIEM or log management platformVerify that firewall events are logged and retained
Monitoring alert configurationSIEM or monitoring platformVerify that firewall events are actively monitored
WAF configurationWAF console or IaCVerify that application-layer protections are in place
Periodic review recordsReview documentation or ticketsVerify that firewall rules are reviewed periodically

Continuous Evidence Through GRC Platforms

What we tell clients is that GRC platforms (Vanta, Drata, Secureframe) can automate portions of firewall evidence collection through cloud provider integrations. These integrations typically check:

  • Whether security groups have overly permissive inbound rules (0.0.0.0/0)
  • Whether specific high-risk ports are open to the internet (SSH port 22, RDP port 3389)
  • Whether VPC flow logs are enabled
  • Whether WAF is deployed for public-facing load balancers

In our experience, GRC platform checks are useful for continuous monitoring but do not replace the manual evidence collection that auditors require. They catch configuration drift between audits and alert you to issues before the auditor finds them.

Working with Auditors on Network Security Evidence

What Auditors Are Really Looking For

In our experience, auditors evaluating firewall controls are asking three fundamental questions:

  1. Are your system boundaries clearly defined? The auditor needs to understand what is inside scope and what is outside before they can evaluate boundary controls.

  2. Are the boundary controls appropriate for your risk profile? This is where the principle-based nature of SOC 2 matters — the auditor evaluates whether your controls are reasonable, not whether they match a specific checklist.

  3. Are the controls operating effectively? This means evidence of ongoing operation: logs, monitoring alerts, change management records, and periodic reviews throughout the observation period.

Common Auditor Questions and How to Prepare

Auditor QuestionWhat They Are EvaluatingHow to Prepare
"Walk me through your network architecture"System boundary understanding; network segmentationHave a current network diagram; be able to explain each network zone and the controls between them
"How do you manage firewall rule changes?"Change management for network securityDocument your change management process; have sample change records ready
"Show me your firewall rules for production"Least-privilege evaluation; rule documentationExport current rules; ensure each rule has documentation or comments explaining its purpose
"How do you monitor network traffic?"Security monitoring and event detectionShow SIEM configuration, alert rules, and sample alerts
"When was the last time you reviewed your firewall rules?"Periodic review processHave review records with dates, participants, findings, and remediation actions
"Do you have any rules allowing all inbound traffic?"Overly permissive accessReview all rules before the audit; identify and remediate any 0.0.0.0/0 inbound rules not required for public services

Pre-Audit Firewall Checklist

What we recommend completing before your auditor begins fieldwork:

Checklist ItemStatus Check
Network architecture diagram is currentDiagram reflects current infrastructure; no stale components
All firewall rules are documentedEvery rule has a purpose, source, destination, and owner
No unnecessary 0.0.0.0/0 inbound rulesOnly public-facing services (load balancers, CDN origins) have open inbound rules
Change management records exist for observation periodAll firewall changes during the audit period went through change management
Firewall logs flow to SIEMLogs are being collected, retained, and monitored
Alert rules are configuredSIEM rules trigger on security-relevant firewall events
Periodic rule review completedAt least one rule review occurred during the observation period
WAF is deployed for public-facing applicationsWAF with managed rule sets is protecting web applications and APIs
GRC platform checks are passingNo firewall-related failures in your GRC platform compliance dashboard

Common Audit Findings

What We See Most Frequently

In our experience across dozens of SOC 2 audits, these are the network security findings that auditors raise most often:

FindingWhy It HappensPrevention
SSH (port 22) open to 0.0.0.0/0Development convenience; forgotten after initial setupUse bastion hosts or AWS Systems Manager Session Manager; restrict SSH to known IP ranges
RDP (port 3389) open to 0.0.0.0/0Remote access for Windows managementUse VPN or Azure Bastion; never expose RDP to the public internet
All-traffic security group rulesOverly permissive rules created during developmentEnforce port-specific rules; flag all-traffic rules in GRC platform checks
No WAF for public-facing applicationsWAF not considered during initial architectureDeploy WAF as part of your standard deployment architecture for any public-facing service
Firewall changes without documentationRules changed directly in console without change requestEnforce IaC for firewall management; restrict console write access
VPC flow logs not enabledNot enabled by default; overlooked during setupEnable VPC flow logs for all VPCs as part of your standard account configuration
No periodic firewall rule reviewNot scheduled or prioritizedSchedule quarterly reviews; assign ownership; track completion in your GRC platform
Flat network architectureNo segmentation between application tiersImplement subnet-based segmentation with security groups controlling inter-tier access

Key Takeaways

  • What we tell clients is that SOC 2 does not prescribe specific firewall products or architectures — the Trust Service Criteria (CC6.1, CC6.6, CC6.7) require you to demonstrate appropriate security measures at your system boundaries, and cloud-native firewall controls satisfy this requirement when properly configured and governed
  • In our experience, the most important step in firewall compliance is clearly defining your system boundaries — the auditor cannot evaluate whether your boundary controls are adequate until they understand where those boundaries are, so your network architecture diagram and system description are foundational evidence
  • What we recommend for cloud-native environments is Security Groups (AWS), NSGs (Azure), or VPC firewall rules (GCP) as your primary firewall controls, supplemented by WAF for public-facing applications — this combination satisfies SOC 2 requirements without the cost and complexity of third-party firewall appliances
  • In our experience, the most common firewall audit findings are overly permissive inbound rules (SSH and RDP open to the internet), missing WAF for public-facing services, firewall changes made outside change management, and insufficient logging — all of which are preventable through configuration standards and process discipline
  • What we tell clients about firewall evidence is that auditors need to see ongoing operation throughout the observation period, not just current state — this means change management records, log samples, monitoring alerts, and periodic review documentation spanning the full audit window
  • We help our clients build network security architectures that satisfy SOC 2 auditors by combining cloud-native firewall controls with the documentation, change management processes, monitoring capabilities, and periodic reviews that demonstrate effective operation over time
Agency Team

Agency Team

Agency Insights

Expert guidance on cybersecurity compliance from Agency's advisory team.

LinkedIn

Related Reading

Stay ahead of compliance

Expert insights on cybersecurity compliance delivered to your inbox.

We respect your privacy. Unsubscribe anytime.